Techical Seminar DS

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

A Seminar Report

On

DIGITAL SIGNATURE

By

Mr. ARUN AMBALLA

(16261A0505)

MENTORED BY

DR. A. NAGESH

(PROFESSOR)

BACHELOR OF TECHNOLOGY

IN COMPUTER SCIENCE AND

TECHNOLOGY

MAHATMA GANDHI INSTITUTE OF TECHNOLOGY

(Affiliated to JAWAHARLAL NEHRU TECHNOLOGICAL


UNIVERSITY)

GANDIPET, HYDERABAD-500075 TELANGANA(INDIA)

AUGUST 2019
MAHATMA GANDHI INSTITUTE OF TECHNOLOGY
(Estd in 1997 by Chaitanya Bharathi Educational Society) (Affiliated
to JNTU, Hyderabad; Accredited by NBA, AICTE-New Delhi)
Kokapet(village & gram panchayat), Rajendra Nagar (Mandal), Ranga
Reddy(Dist.), Chaitanya Bharathi P.O., Hyderabad-500 075.

CERTIFICATE

This is to certify that the Seminar (CS706PC) entitled “ DIGITAL


SIGNATURE”, being submitted by A.ARUN bearing Roll No: 16261A0505 in partial
fulfillment of the requirements for the Award of the Degree of Bachelor of Technology in
Computer Science and Engineering is a record of bonafide work carried out by him.

Seminar Coordinators
Head of the Department

Mrs. P Poornima Dr. C.R.K. Reddy


(Assistant Professor) Computer Science and Engineering

Mrs. M Mamatha
(Assistant Professor)

Mrs .Dr. K Sreekala


(Assistant Professor)
DIGITAL SIGNATURE

A. Arun

Department of Computer Science and Engineering


Mahatma Gandhi Institute of Technology
Hyderabad, India
arunamballa24@gmail.com,16261A0505

ABSTRACT : In the last few years, there has been a


rapidly growing demand for a working
digital signature framework for both public
The Information Technology Act and public sector. The study revolves
2000(ITAct) dictates digital signatures as a around the maximum information on digital
means of authentication and security of signature, the future of Information
electronic documents. Digital signature is Technology
an electronic token that creates binding
between an entity and a data record. They
serve the purpose of validation and 1. INTRODUCTION :
authentication of electronic documents.
Validation refers to the process of The authenticity of many legal, financial,
certifying the contents of the document, and other documents is determined by the
while authentication refers to the process of presence or absence of an authorized
certifying the sender of the document. It can handwritten signature. The recipient of
be said that a digital signature is an the signed document can verify the
electronic version of a handwritten claimed identity of the sender using the
signature. The signing process is signature. 1Also, if the sender later
implemented with the help of public key repudiates the contents of the document,
cryptography; the signatory uses her private then recipient can use the signature to
key to create a digital signature for a prove the validity of the document. With
document. It is used to ensure that the the computerized message systems
original content of the message or replacing the physical transport of paper
document that has been sent is unchanged. and ink documents, an effective solution
Its varied nature has provided easy, faster, for authentication of the electronic data is
accurate and convenient mechanism for necessary. Various methods have been
creating, storing, transmission and retrieval devised to solve this problem, but the use
of data without involving traditional paper of ‘digital signature’ is definitely the best
based formalities. This has increased the solution amongst them.
use of digital technology in day to day life
which has led the world to go online that in A digital signature is nothing but an
turn has increased techno-dependency. attachment to any piece of electronic
Increasingly the business dealings, information, which represents the content
communication, official data and of the document and the identity of the
commercial transactions are being carried originator of that document uniquely.
out in cyberspace. There has been
transformation of world from paper based
to digital based work.
The digital signature is intended for use in This report is an attempt to make the
electronic mail, electronic funds transfer, readers familiar with the concepts related
electronic data interchange, software to the digital signature and give them an
distribution, data storage, and other idea of usefulness of a digital signature in
applications which require data integrity the world of electronic information
assurance and data origin authentication. exchange

When a message is received, the recipient


may desire to verify that the message has
2. HISTORY :
not been altered in transit. Furthermore,
the recipient may wish to be certain of the
originator's identity. Both of these It is probably not surprising that the
services can be provided by the digital inventors of writing, the Sumerians, were
signature. A digital signature is an also the inventors of an authentication
electronic analogue of a written signature mechanism. The Sumerians used
in that the digital signature can be used in intricate seals, applied into their clay
proving to the recipient or a third party cuneiform tablets using rollers, to
that the message was, in fact, signed by authenticate their writings. Seals
the originator. Digital signatures may also continued to be used as the primary
be generated for stored data and programs authentication mechanism until recent
so that the integrity of the data and times.
programs may be verified at any later
time. Although there are various Use of signatures is recorded in the
approaches to implement the digital Talmud (fourth century), complete with
signature, this report discusses the security procedures to prevent the
‘Digital Signature Standard’. It specifies alteration of documents after they are
the Digital Signature Algorithm (DSA) signed. The Talmud even describes use of
which is appropriate for applications a form of "signature card" by witnesses to
requiring a digital rather than written deeds.
signature.
The DSA is considered as the standard The practice of authenticating
procedure to generate and verify digital documents by affixing handwritten
signatures. A DSA digital signature is a signatures began to be used within the
pair of large numbers represented in a Roman Empire in the year AD 439,
computer as strings of binary digits. The during the rule of Valentinian
first section of this report deals with the The sub scripto - a short handwritten
basic requirements for using the digital sentence at the end of a document stating
signature. The next sections contain that the signer "subscribed" to the
detailed explanation of the process of document - was first used for
generation and verification of the digital authenticating wills.
signature. In addition to this the
applications of the digital Signature are The practice of affixing signatures to
also discussed. The report also focuses on documents spread rapidly from this initial
some legal aspects of digital signature, usage, and the form of signatures (a hand-
with reference to the Information written representation of one’s own name)
Technology Act. The use of digital remained essentially unchanged for over
signature has been illustrated with an 1,400 years.
example in a practical scenario.
3. DIGITAL SIGNATURE: People use public –key cryptography to
compute digital signatures by associating
Basically, the idea behind digital signatures something unique with each person. When
is the same as your handwritten signature. public-key cryptography is used to encrypt a
You use it to authenticate the fact that you message, the sender encrypts the message
promised something that you can't take back with the public key of the intended recipient.
later. A digital signature doesn't involve
signing something with a pen and paper then When public -key cryptography is used to
sending it over the Internet. But like a paper calculate a digital signature, the sender
signature, it attaches the identity of the signer encrypts the “digital fingerprint” of the
to a transaction. Having a digital certificate document with his or her own private key.
is like using your driver's license to verify Anyone with access to the public key of the
your identity. You may have obtained your signer may verify the signature.
license from Maryland, for example, but
your Maryland license lets you drive in In practice, public-key algorithms are often
Nevada and Florida. Similarly, your digital too inefficient for signing long documents.
certificate proves your online identity to To save time, digital signature protocols use
anybody who accepts it. a cryptographic digest, which is a one-way
hash of the document. The hash is signed
A digital signature can also be used to verify instead of the document itself. Both the
that information has not been altered after it hashing and digital signature algorithms are
was signed. A digital signature is an agreed upon beforehand. Here is a summary
electronic signature to be used in all of the process:
imaginable type of electronic transfer.
Digital signature significantly differs from 1. A one-way hash of the document is
other electronic signatures in term of process produced.
and results. These differences make digital
signature more serviceable for legal 2. The hash is encrypted with the private key,
purposes. thereby signing the document.

Digital signatures are based on 3. The document and the signed hash are
mathematical algorithms. These require the transmitted.
signature holder to have two keys (one
private and the public) for signing and 4. The recipient produces a one-way hash of
verification . A verifiable trustworthy entity the document.
called certification authority creates and
distributes signatures. A digital signature is a 5. Using the digital signature algorithm, the
cryptographic means through which many of recipient decrypts the signed hash with the
these may be verified. The digital signature sender's public key. If the signed hash
of a document is a piece of information based matches the recipient's hash, the signature is
on both the document and the signer’s valid and the document is intact.
private key. It is typically created through the
use of a hash function and a private signing
function (encrypting with the signer’s 4. REQUIREMENTS:
private key).
The Basic Requirements of the Digital
Digital Signatures and hand – written Signature are following:-
signatures both rely on the fact that it is very
hard to find two people with the same
signature.
• PRIVATE KEY 4.3 Digital Signature Certificate:
• PUBLIC KEY
• DIGITAL SIGNATURE who are intended to receive the signed
CERTIFICATE messages from the subscriber. But in case of
any dispute between the two sides, there
must be some entity with the receiver which
will allow the receiver of the message to
prove that the message was indeed sent by
the subscriber of the key pair.

This can be done with the Digital Signature


Certificate. This certificate lists the
subscriber’s public key. So, it acts as a
binding between the private and public keys.
Any message verified by the public key
Figure 1: Digital Signature Components listed on the certificate is implicitly assumed
to be signed and sent by the corresponding
subscriber.
4.1 Private Key:
A digital signature certificate is issued by
The private key is one which is accessible the Certifying Authority to the applicants.
only to the signer. It is used to generate the For obtaining this certificate the applicant
digital signature which is then attached to the must produce the private key and public key
message. It is very important to have a pair before the certifying authority. After
unique private key for each user, so that the checking the functioning of the key pair the
signature generated by that key for a given certifying authority issues a certificate to the
message can not be duplicated by any other applicant
key. The security of a digital signature
system is dependent on maintaining the
secrecy of users' private keys. Users must
therefore guard against the unauthorized
acquisition of their private keys.

4.2 Public Key:

The public key is made available to all those


who receive the signed messages from the
sender. It is used for verification of the
received message. Although the public key is
uniquely associated with the private key,
there is no recognizable similarity between
them. This is done purposefully to avoid Figure 2: Digital Signature Certificate
discovery of the private key from the public
key. Thus the holder of a public key can just
verify the message received from the sender.
Any person who digitally signs his messages 5. WORKING:
must distribute the public key to the
recipients of his messages, so that they can Digital signatures require the use of public-
verify the validity of these messages. key cryptography .
If you are going to sign something, digitally, 6.1 Direct Digital Signature:
you need to obtain both a public key and a
private key. The private key is something A direct digital signature involves only the
you keep entirely to yourself. communication parties (source and
destination). It is assumed that the
You sign the document using your private destination knows the public key of the
key- which is really just a kind of code-then source. A digital signature may be formed by
you give the person (the merchant of the encrypting the entire message with the
website where you bought something or the sender’s private key or by encrypting the
bank lending your money to buy a house) hash code of the message with the sender’s
who needs to verify your signature your private key.
corresponding public key.
Confidentiality can be provided by further
He uses your public key to make sure you are encrypting the entire message plus signature
who you say you are. The public key and with either the receiver’s public key or a
private key are related, but only shared secret key. It is important to perform
mathematically, so knowing your private the signature function first and then an outer
key. In fact, it’s nearly impossible to figure confidentiality function.
out your private key from your public key.
In case of dispute some third party must view
The sender accomplishes the process of the message and signature. If the signature is
creating a digital signature. The receiver of calculated on an encrypted message, the
the digital signature performs the third party also needs access to the
verification of the digital signature. decryption key to read the original message.
All direct schemes described so far have a
common flaw:

The validity of the scheme depends on the


security of the sender’s private key. If a
sender later wishes to deny sending a
particular message, he can claim that the
private key was lost or stolen and that
someone else forged his signature.

Administrative controls relating to the


security of private keys can be employed to
thwart or at least weaken this ploy. One
example is to require every signed message
Figure 3: Working Procedure to include a timestamp (date and time) and to
require prompt reporting to compromise
keys by a central authority.
6. APPROACHES:
Another threat is that the private key might
A variety of approaches have been proposed be stolen from sender X at time T. The
for digital signature function. These opponent can then send a message signed
approaches fall into two categories: with X’s signature and stamped with a time
• Direct approach before or equal to T.
•Arbitrated approach
6.2 Arbitrated Approach: 7.3 Non-repudiation :

The problems associated with direct digital Creating a digital signature requires the
signatures can be addressed by using an signer to use his private key. This alters the
arbiter. As with direct signature schemes, signer that he is consummating a transaction
there are a variety of arbitrated signature with legal consequences, decreasing the
schemes. In general terms, these all operate chances of litigation later on.
as follows: every signed message from
sender X to the receiver Y goes first to the 7.4 Integrity :
arbiter A, who subjects the message and its
signature to the number of tests to check its Digital signature creation and verification
origin and content. processes provide a high level of assurance
that the digital signature is that of the signer.
The message is then dated and sends to Y Compared to tedious and labor intensive
with an indication that it has been verified to paper methods, such as checking signature
the satisfaction of the arbiter. With the cards, digital signatures yield a high degree
presence of arbiter A, there are no chances of of assurance without adding resources for
a sender X to disowning the message, as is processing
the case with the direct digital signatures.
The arbiter plays a crucial role in arbitrated
digital signatures and all parties must have a 8.DIGITAL SIGNATURE
great deal of trust that the arbitration ALGORITHM:
mechanism working properly. The use of a
trusted system might satisfy this
requirement. The digital signature algorithm specifies the
procedure to generate and verify the digital
signature.
7. PURPOSE OF DIGITAL • Digital Signature Generation
• Digital Signature Verification
SIGNATURE:

7.1 Signer authentication :


If public and private keys are associated
with an identified signer, the digital
signature attributes the message to the
signer. The digital signature cannot be
forged, unless the signer loses control of the
private key.

7.2 Message authentication : Figure 4: Digital Signature Algorithm

Digital signature identifies the signed


message with far greater certainty and
precision than paper signatures. Verification
reveals any tempering since the comparison
of hash result shows whether the message is
the same as when signed.
8.1 Digital Signature Generation: 4. Once a signature is generated, it is
attached to the original message. Then this
message is send to the other end.

8.2 Digital Signature Verification:

Figure 5: Digital Signature Generation

1. The user of Digital Signature can use this


facility optionally. So if he chooses to send
the message without a signature, then the
Figure 6: Digital Signature Verification
message is directly send to the other end.
But, if he wishes to digitally sign the 1. A user can receive messages from
message, then he is asked for the Private Key different senders. Some of them may be
by the digital signature Generation system. using a digital signature and some may not.
If a message is not digitally signed then the
2. A Secure Hash Algorithm (SHA) is used user accepts it without any verification. But
in the signature generation process to obtain in case of digitally signed message, he can
a condensed version of message, called a verify the message with the help of public
message digest. The SHA is such that it key corresponding to the sender.
generates different message digest for each
different message. In other words, no two 2. The received message is fed to the SHA
messages have the same message digest. for generation of the message digest. The
SHA used by the receiver must be same as
3. The DSA sign unit accepts the message that used by the sender. So, if the message
digest from the SHA and the private key content remains unaltered during the
from the user. Then a digital signature is transport, then SHA will generate the same
generated as a function of both, the private message digest.
key and the message digest. Number of other
parameters called as DSA parameters, are 3. The DSA verify unit accepts the message
also used in this process. These parameters digest from the SHA and the public key from
are discussed in details in the next section. the receiver.
9. SECURE HASH ALGORITHM: 1. p is a prime number, where 2L-1 < p <
2L for 512 <= L <= 1024 and L a multiple
of 64.
This Standard specifies a Secure Hash
Algorithm (SHA), for computing a 2. q is a prime divisor of p - 1, where 2159
condensed representation of a message or a < q < 2160 .
data file. When a message of any length <
264 bits is input, the SHA produces a 160-bit 3. g = h(p-1)/q mod p, where h is any
output called a message digest. The message integer with 1 < h < p - 1 such that h (p-1)/q
digest can then be input to the Digital mod p > 1 (g has order q mod p)
Signature Algorithm (DSA) which generates
or verifies the signature for the message. 4. x = a randomly generated integer with 0
Signing the message digest rather than the <x<q
message often improves the efficiency of the
process because the message digest is 5. y = gx mod p
usually much smaller in size than the
message. The same hash algorithm must be 6. k = a randomly or generated integer with
used by the verifier of a digital signature as 0<k<q
was used by the creator of the digital
signature. The integers p, q, g can be public and they
can be common to a group of users. A user's
private and public keys are x and y,
respectively. They are normally fixed for a
period of time. Parameters x and k are used
for signature generation only, and must be
kept secret. Parameter k must be regenerated
for each signature.

10.1 Signature Generation.


The signature of a message M is the pair of
numbers r and s computed according to the
equations below.

r = (gk mod p) mod q and


Figure 7: Secure Hash Algorithm

s = (k-1 (SHA (M) + xr)) mod q.


The SHA is called secure because it is
computationally infeasible to find a message The value of SHA (M) is a 160-bit string
which corresponds to a given message output by the Secure Hash Algorithm. For
digest, or to find two different messages use in computing s, this string must be
which produce the same message digest. converted to an integer. As an option, one
Any change to a message in transit will, with may wish to check if r = 0 or s = 0.
very high probability, result in a different
message digest, and the signature will fail to If either r = 0 or s = 0, a new value of k
verify. should be generated and the signature should
be recalculated (it is extremely unlikely that
r = 0 or s = 0 if signatures are generated
10. DSA PARAMETERS: properly).
The DSA (Digital Signature Algorithm)
makes use of the following parameters:
The signature is transmitted along with the
message to the verifier. 11.1Institutional overhead:
10.2 Signature Verification. The cost of establishing and utilizing
certification authorities, repositories, and
Prior to verifying the signature in a signed other important services, as well as assuring
message, p, q and g plus the sender's public quality in the performance of their functions.
key and identity are made available to the
verifier in an authenticated manner. 11.2 Subscriber and Relying Party
Let M', r' and s' be the received versions of
Costs:
M, r, and s, respectively, and let y be the
A digital signer will require software, and
public key of the signatory. To verifier first
will probably have to pay a certification
checks to see that 0 < r' < q and 0 < s' < q; if
authority some price to issue a certificate.
either condition is violated the signature
Hardware to secure the subscriber's private
shall be rejected. If these two conditions are
key may also be advisable. Persons relying
satisfied, the verifier computes
on digital signatures will incur expenses for
verification software and perhaps for access
w = (s')-1 mod q
to certificates and certificate revocation lists
(CRL) in a repository.
u1 = ((SHA (M') w) mod q
On the plus side, the principal advantage to
u2 = ((r') w) mod q
be gained is more reliable authentication of
messages. Digital signatures if properly
v = (((g)u1 (y)u2 ) mod p) mod q.
implemented and utilized offer promising
solutions to the problems of:
If v = r', then the signature is verified and the
verifier can have high confidence that the
•Imposters, by minimizing the risk of
received message was sent by the party
dealing with imposters or persons who
holding the secret key x corresponding to y.
attempt to escape responsibility by claiming
For a proof that v = r' when M' = M, r' = r,
to have been impersonated;
and s' = s, see Appendix1.

If v does not equal r', then the message may • Message integrity, by minimizing the risk
have been modified, the message may have of undetected message tampering and
been incorrectly signed by the signatory, or forgery, and of false claims that a message
the message may have been signed by an was altered after it was sent.
impostor. The message should be considered
invalid 12.APPLICATIONS OF DIGITAL
SIGNATURE:
11.CHALLENGES AND
OPPURTUNITIES: The scope of Digital Signature is not just
limited to exchange of messages. The
The prospect of fully implementing digital handwritten signature is commonly used in
signatures in general commerce presents all kinds of applications to prove the identity
both benefits and costs. of the signer.

The costs consist mainly of: In the same way, a digital signature can be
used for all kinds of electronic records.
Any field in which the integrity and validity So before generating the message digest, the
of the data is crucial, can make use of a message should be encrypted. Then the
Digital Signature. Here we discuss a few of digital signature is generated and attached to
these applications. the message. At the receiving end after
verification of signature, the message is
12.1.Electronic Mail. decrypted to recover the original message.

When we send an e-mail to a mailbox, it is 12.4.Software Distribution:


desired that the owner of the mailbox should
get the e-mail in its original form. If during Software developers often distribute their
transport, the content changes either software using some electronic media, for
accidentally or due to intrusion by a third example, the internet. In this case, in order to
party, then the receiving end should be able ensure that the software remains unmodified
to recognize this change in the content. Also and its source is genuine, Digital Signature
no person should be able to send e-mail in can be used. The developer signs the
the disguise of another person. Both these software and the users verify the signature
factors are taken care of by the Digital before using it. If signature gets verified,
signature. Any change in the e-mail will then only the users can be sure about the
affect the message digest generated by the validity of that software
SHA and thus the digital signature will be
marked as unverified. So the recipient will 13.DRAWBACKS OF USING
reject that message. DIGITAL SIGNATURE :
12.2. Data storage. Although the digital signature technique is a
very effective method of maintaining
This is one more interesting application of integrity and authentication of data, there are
Digital Signature. Suppose a large amount of some drawbacks associated with this
data is stored on a computer. Only method.
authorized people are allowed to make
changes to the data. In such case, along with They are discussed in this section.
the data, a signature can also be stored as an
attachment. This signature is generated from 13.1. The private key must be kept in a
the data digest and the private key. So if any secured manner. The loss of private key can
changes are made in the data by some cause severe damage since, anyone who gets
unauthorized person, then they will get the private key can use it to send signed
easily recognized at the time of signature messages to the public key holders and the
verification and thus that copy of data will be public key will recognize these messages as
discarded. valid and so the receivers will feel that the
message was sent by the authentic private
12.3.Electronic funds transfer: key holder.

Applications like online banking, e- 13.2. The process of generation and


commerce come under this category. In these verification of digital signature requires
applications the information being considerable amount of time. So, for
exchanged by the two sides is vital and thus frequent exchange of messages the speed of
extreme secrecy and authenticity must be communication will reduce.
maintained. A digital signature can ensure
the authentication of the information but, the 13.3. When the digital signature is not
secrecy should be maintained by using some verified by the public key, then the receiver
encryption techniques. simply marks the message as invalid but he
does not know whether the message was
corrupted or the false private key was used.
13.4. For using the digital signature the user
has to obtain private and public key, the
receiver has to obtain the digital signature
certificate also. This requires them to pay
additional amount of money.

14. CONCLUSION:
Digital signatures are difficult to
understand. Digital signatures will be
championed by many players that the public
distrusts, including national security
agencies, law enforcement agencies, and
consumer marketing companies. Digital
signatures will inevitably be associated with
cards. Digital signatures will inevitably be
associated with biometric identifiers. As a
result, it appears that digital technology is
rapidly becoming pervasive, the public not
find this comforting. They will demand
explicit privacy protections, far more
substantial than the weak and patchy regime
that is presently in place. The protections are
also quite inadequate, though promising in
some respects. Successful implementation of
digital signatures will require far more
attention to privacy issues by policymakers
and business interests.

15.ACKNOWLEDGMENT:

We express our immense pleasure and


thankfulness to all the teachers and staff of
the Dept. of Computer Science &
Engineering for their cooperation and
support

16.REFERENCES:

1. www.wikipedia.com
2. www.google.com
3. www.tutorialpoint.com

You might also like